Florida Atlantic University

Displaying 1 - 10 of 12 results

BPEL (Business Process Enterprise Language) is a language for web services composition and several implementations of it exist. For BPEL to be effective, it is necessary that it provides more support for security. BPEL doesn't present any means to specify security constraints for workflows. BPEL through its activities tries to
...

To simplify the design process for a group key establishment protocol, it can be convenient to restrict first to a scenario with a passive adversary, where the problem of authenticating protocol participants does not need to be addressed. The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform
...

Web services first appeared around the year 2000 in an effort to improve interoperability between applications, and both IBM and Microsoft adopted them as part of their main strategic objectives. The authors have collected five papers describing different aspects of web services and cloud computing. Cloud computing is the next
...

An important aspect for the acceptance of Service-Oriented Architectures is having convenient ways to help designers build secure applications. Numerous standards define ways to apply security in web services. However, these standards are rather complex and sometimes overlap, which makes them hard to use and may produce inconsistencies. Representing them
...

Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. It is proved that the optimal positions of the relay nodes along a single active flow must lie entirely on the line between the source and destination with each node spaced
...

This paper considers a heterogeneous wireless sensor network consisting in several resource-rich supernodes used for data relaying and a large number of energy constrained wireless sensor nodes. Sensor nodes are deployed randomly to monitor a number of targets. Since targets are redundantly covered by more sensors, in order to conserve
...

In this paper, the authors propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. They also present an extended classification of digital video encryption algorithms in order to clarify these advantages. They analyze both security and performance aspects of
...

A Hopfield neural network exhibits the phenomenon of stochastic error in convergence. Based on this non-determinism, Guo-Cheng-Cheng proposed a symmetric block cipher. Cryptanalysis of this cryptosystem led to an interesting mathematical problem - given two matrices that are conjugate of each other by a permutation matrix, find such permutation matrix.
...

Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this paper, the authors show that the principles of collision attacks can be adapted to efficiently
...

Data security has become one of the most important concerns for organizations. Information is a valuable asset and needs to be protected. One important countermeasure against attackers is the use of digital signatures. Digital signatures provides message authentication and may also provide message integrity. The authors present here two patterns:
...